def run(self): nflog = NFLOG().generator(self.queues, extra_attrs=['ts'], **self.nflog_kwargs) next(nflog) for pkt_info in nflog: self.pipe.append(pkt_info) self._pipe.write('.') # block until other thread reads it self._pipe.flush()
setup(name='scapy-nflog-capture', version='13.05.0', author='Mike Kazantsev', author_email='*****@*****.**', license='WTFPL', keywords=[ 'nflog', 'scapy', 'plugin', 'driver', 'traffic', 'analysis', 'analyze', 'capture', 'dump', 'network', 'linux', 'security', 'sniffer', 'spoof', 'netfilter', 'iptables', 'xtables', 'filter', 'filtering', 'firewall', 'audit', 'cffi', 'libnetfilter_log', 'socket' ], url='http://github.com/mk-fg/scapy-nflog-capture', description= 'Driver for scapy to allow capturing packets via Linux NFLOG interface', long_description=readme, classifiers=[ 'Development Status :: 4 - Beta', 'Intended Audience :: Developers', 'Intended Audience :: System Administrators', 'Intended Audience :: Telecommunications Industry', 'License :: OSI Approved', 'Operating System :: POSIX :: Linux', 'Programming Language :: Python', 'Programming Language :: Python :: 2.7', 'Programming Language :: Python :: 2 :: Only', 'Topic :: Security', 'Topic :: System :: Networking :: Monitoring', 'Topic :: System :: Operating System Kernels :: Linux' ], ext_modules=[NFLOG().ffi.verifier.get_extension()], py_modules=['nflog_cffi', 'scapy_nflog'], package_data={'': ['README.txt']})